Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 10307 dokumen yang sesuai dengan query
cover
New York: McGraw-Hill, 2007
R 005.8 GRA
Buku Referensi  Universitas Indonesia Library
cover
New York : McGraw-Hill, 2011
005.8 GRA
Buku Teks  Universitas Indonesia Library
cover
Dony Ariyus
Yogyakarta: Andi, 2005
005.8 DON k
Buku Teks  Universitas Indonesia Library
cover
Engebretson, Pat
Amsterdam : Elsevier, 2013
005.8 ENG b
Buku Teks  Universitas Indonesia Library
cover
Amsterdam: Elsevier, 2012
005.8 LOW
Buku Teks  Universitas Indonesia Library
cover
Cheswick, William R.
Masschusetts: Addison-Wesley, 1994
005.8 CHE f
Buku Teks  Universitas Indonesia Library
cover
"Professional penetration testing walks you through the entire process of setting up and running a pen test lab. Penetration testing—the act of testing a computer network to find security vulnerabilities before they are maliciously exploited—is a crucial component of information security in any organization. With this book, you will find out how to turn hacking skills into a professional career. Chapters cover planning, metrics, and methodologies; the details of running a pen test, including identifying and verifying vulnerabilities; and archiving, reporting and management practices.
Author Thomas Wilhelm has delivered penetration testing training to countless security professionals, and now through the pages of this book you can benefit from his years of experience as a professional penetration tester and educator. After reading this book, you will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios."
Waltham, MA: Syngress, 2013
e20427657
eBooks  Universitas Indonesia Library
cover
"This book discusses the implications of new technologies for a secured society. As such, it reflects the main focus of the International Conference on Ethical Hacking, eHaCon 2018, which is essentially in evaluating the security of computer systems using penetration testing techniques. Showcasing the most outstanding research papers presented at the conference, the book shares new findings on computer network attacks and defenses, commercial security solutions, and hands-on, real-world security experience. The respective sections include network security, ethical hacking, cryptography, digital forensics, cloud security, information security, mobile communications security, and cyber security."
Singapore: Springer Singapore, 2019
e20502821
eBooks  Universitas Indonesia Library
cover
Bathurst, Robert
Boston : Syngress , 2013
005.268 BAT h
Buku Teks  Universitas Indonesia Library
cover
"The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise.
The book is organized into 10 parts comprised of 70 contributed chapters by leading experts in the areas of networking and systems security, information management, cyber warfare and security, encryption technology, privacy, data storage, physical security, and a host of advanced security topics. New to this edition are chapters on intrusion detection, securing the cloud, securing web apps, ethical hacking, cyber forensics, physical security, disaster recovery, cyber attack deterrence, and more."
Waltham, MA: Morgan Kaufmann, 2013
e20426927
eBooks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>